Location of Repository

Cyber trust and crime prevention

By Brian S. Collins and Robin Mansell
Topics: HN Social history and conditions. Social problems. Social reform
Publisher: Edward Elgar
Year: 2005
OAI identifier: oai:eprints.lse.ac.uk:9001
Provided by: LSE Research Online

Suggested articles

Preview

Citations

  1. (2003a), ‘Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries for Assisting Computer Security Incident Response Teams (CSIRTs)’, http://www.iaac.org.uk/csirt/csirtWS-flyer.pdf accessed 17
  2. (1999). A Brief History of the Future,
  3. (2002). A Collective Security Approach to Protecting the Global Critical Infrastructure’,
  4. (1972). A Theory of Justice, doi
  5. (2001). Affective Design of E-Commerce User Interfaces: How to Maximise Perceived Trustworthiness’,
  6. (2003). After Amplification: Rethinking the Role of the Media in Risk Communication’, doi
  7. (2001). As Time Goes By: From the Industrial Revolutions to the Information Revolution, doi
  8. (1998). Auditing the IT Security Function’, doi
  9. (2002). Autonomy and Trust in Bioethics, Cambridge: doi
  10. Benchmarking Security and Trust in Europe and the US’, Statistical Indicators Benchmarking the Information Society
  11. (2001). Between the Risk and the Reality Falls the Shadow”: Evidence and Urban Legends in Computer Fraud’, doi
  12. (2000). Bounds of Justice, Cambridge: doi
  13. (2000). Bowling Alone: The Collapse and Revival of American Community, doi
  14. (2003). Broadband Internet: The Power to Reconfigure Access’. doi
  15. Building Trust in the Online Environment: Business to Consumer Dispute Resolution’,
  16. (2002). Can Asians Think? Understanding the Divide Between East and West, South Royalton VT:
  17. (1999). Can We Make Crime Prevention Adaptive by Learning from
  18. (1996). City of Bits: Space, Place and the Infobahn, doi
  19. (1999). Code and Other Laws of Cyberspace, doi
  20. (1995). Connecting Orwell to Athens? Information Superhighways and the Privacy Debate’,
  21. (2000). Consumer Buying Behavior on the Internet: Findings from Panel Data’, doi
  22. (1987). Crime and Everyday Life, Thousand Oaks CA:
  23. (2003). Cryptography and Competition Policy: Issues with “Trusted Computing”‘, Cambridge University working paper, http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tcpa.pdf accessed 17
  24. (1992). Cultural Theory and Risk Analysis’, in S. Krimsky and D. Golding (eds) Social Theories of Risk,
  25. (1997). Digital Certificates and Certificate Authorities’, Database Web Advisor,
  26. (1997). Does Social Capital have an Economic Payoff?’, doi
  27. (2003). Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security’, doi
  28. (1978). EDP Risk Analysis for Contingency Planning’, doi
  29. (1998). Electronic Confidence: Trust, Information and Public Administration’ in I. Snellen and W. van de Donk (eds) Public Administration in an Information Age: A Handbook,
  30. (2000). EU’s Communication on Precautionary Principle’, doi
  31. (2003). For Building e-Confidence: A Proposal for the Trusted Third Party Model’,
  32. (2003). Formality and Informality in Internal Control Systems: A Comparative Study of Control in Different Social and Cultural Environments in a Global Bank’,
  33. (2003). From Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Society,
  34. (2000). From Science/Policy Interface to Science/Policy/Society Dialogue’, paper for the conference ‘The Contribution of Social Sciences to Knowledge and Decision Making’,
  35. (2002). Future Imperfect: Preparing for the Crimes to Come’, doi
  36. (1992). Game Theory for Applied Economics,
  37. (1997). Gearing Up Against Crime: A Dynamic Framework to Help Designers Keep Up with the Adaptive Criminal in a Changing World,
  38. (2000). Going Equipped: Criminology, Situational Crime Prevention and the Resourceful Offender’,
  39. (1988). Groupware: Computer Support for Business Teams,
  40. (2004). Hi-Tech Crime: The Impact on UK Business, Report by the National Hi-Tech Crime Unit’, London, http://www.nhtcu.org/ accessed 17
  41. (2002). Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies – A Case Study for User Identification’,
  42. (2004). in press), ‘How to Police the Future: Scanning for Scientific and Technological Innovations which Generate Potential Threats and Opportunities in Crime, Policing and Crime Reduction’,
  43. (1979). Incentives and Incomplete Information’, doi
  44. (2001). Is Trust Self-fulfilling: An Experimental Study’, doi
  45. (2003). LargeScale, Small-Scale Systems’, Foresight Cognitive Systems Research Review, http://www.foresight.gov.uk/cognitive.html accessed 17
  46. (1995). Legislating Privacy: Technology, Social Values and Public Policy, Chapel Hill NC: doi
  47. (1993). Making Democracy Work: Civic Traditions in Modern Italy, doi
  48. (2001). Market Sharing Agreements and Collusive Networks’, doi
  49. (1984). Mediated Group Communication’,
  50. (2000). Mobilizing the Information Society: Strategies for Growth and Opportunity, doi
  51. (1991). Modernity and Self-identity: Self and Society in the Late Modern Age, Stanford CA: doi
  52. (2003). Nationwide Ditches Iris and Fingerprint Biometrics’, 23 September, http://www.silicon.com/software/security/0,39024655,10006129,00.htm accessed 17
  53. (2000). Net Compatible: The Economic and Social Dynamics of E-commerce’,
  54. (2003). On-line Trust: Concepts, Evolving Themes, A Model’, doi
  55. (1992). Opening Black Boxes: Science, Technology and Society’, doi
  56. (2000). Optimal Parochialism: The Dynamics of Trust and Exclusion in Networks’, Santa Fe Institute Working Paper,
  57. (1984). Patrons, Clients and Friends, Cambridge: doi
  58. (2003). Persuasive Technology. Using Computers to Change What We Think and Do, doi
  59. (2002). Privacy and Data Sharing’, Performance and Innovation Unit, Cabinet Office,
  60. (2003). Privacy and Data-Sharing: Survey of Public Awareness and Perceptions,
  61. (2002). Privacy as a Common Good in the Digital World’, doi
  62. (2001). Privacy in Multimedia Communications: Protecting Users, Not Just Data’, doi
  63. (2003). Privacy, Identity and Crime Prevention’,
  64. (2003). Public Perceptions of Risk, Science and Governance: Main Findings of a British Survey of Five Risk Cases’,
  65. (1966). Purity and Danger: An Analysis of Concepts of Pollution and Taboo, London: Routledge and Kegan Paul. doi
  66. (1992). Regulating Privacy: Data Protection and Public Policy in Europe and the United States, doi
  67. (1992). Risk and Blame: Essays in Cultural Theory, doi
  68. (1982). Risk and Culture: An Essay on the Selection of Technical and Environmental Dangers, doi
  69. (1993). Risk and Recreancy: Weber, the Division of Labor, and the Rationality of Risk Perceptions’, doi
  70. (2000). Risk Perception, Trust and Credibility: A Case in
  71. (1992). Risk Society: Towards a New Modernity, doi
  72. (1977). Security Risk Analysis doi
  73. (1997). Situational Crime Prevention: Successful Case Studies, doi
  74. (2001). Social Amplification of Risk: The Media and the Public, Health and Safety Executive Contract Research Report 329/2001.
  75. (1980). Social Justice in the Liberal State, doi
  76. (1995). Social Trust: Toward a Cosmopolitan Society,
  77. (1999). Society on the Line: Information Politics in the Digital Age,
  78. (1999). Soft Systems Methodology. A 30-year Retrospective, doi
  79. (2004). Submission to the Royal Academy of
  80. (1994). Systems Competition and Networks Effects’, doi
  81. (2002). Technological Revolutions and Financial Capital: The Dynamics of Bubbles and Golden Ages, doi
  82. (2000). The Burdens of Situational Crime Prevention’,
  83. (1999). The Certainty Trough’,
  84. (2003). The Conjunction of Criminal Opportunity: A Framework for Crime Reduction’, Home Office Crime and Policing
  85. (2004). The Conjunction of Criminal Opportunity’, developed between doi
  86. (2001). The Economics of Trust, Norms and Networks’, doi
  87. (1996). The Essential Role of Trusted Third Parties
  88. (1984). The Evolution of Cooperation, doi
  89. (2001). The Hacker Ethic, doi
  90. (2003). The Increasing Involvement of Concerned Groups in R&D Policies: What Lessons for Public Powers?’ doi
  91. (1983). The Logic and Limits of Trust, doi
  92. (1995). The Mythical Man-Month: doi
  93. (2000). The New Spectacle of Crime’, doi
  94. (1970). The Order of Things: An Archaeology of the Human Science, translation of Les Mots et les Choses doi
  95. (2003). The Researcher’s Dilemma: Evaluating Trust in doi
  96. (2003). The See-through Society: Openness and the Future of the Internet’,
  97. (2003). The Social Amplification of Risk, Cambridge: doi
  98. (2003). The Social Amplification of Risk: Assessing Fifteen Years of Research and Theory’, doi
  99. (2003). The Social Dynamics of Environmental Risk Perception: Implications for Risk Communication Research and Practice’, doi
  100. (1997). The Strategic Values of Information Security doi
  101. (1999). The Telecoms Data Protection Directive (97/66/EC) and the Telecommunications (Data Protection and Privacy) Regulations doi
  102. (2003). Toward Public Key Infrastructure Interoperability’, doi
  103. (1996). Towards a Discipline of Crime Prevention: A Systematic Approach to its Nature, Range and Concepts’,
  104. (2003). Towards a Knowledge-based Economy, Brussels, EC, http://www.cordis.lu/indicators/third_report.htm accessed 17
  105. (1979). Trust and Power, doi
  106. (2001). Trust in Signs’, doi
  107. (2002). Trust in the New Economy’, HRRI Working Paper 11-02,
  108. (2002). Trust Responsiveness and Beliefs’, doi
  109. (1998). Trust Within Reason, Cambridge: doi
  110. (2004). Trust: From Socrates to Spin,
  111. (1995). Trust: The Social Virtues and the Creation of Prosperity, doi
  112. (2001). Trustbuilders and Trustbusters: The Role of Trust Cues in Interfaces to E-commerce Applications’,
  113. (1991). Trusting Persons, Trusting Institutions’, doi
  114. Tschammer (eds) Towards the ESociety. doi
  115. (1987). Usable Knowledge, Usable Ignorance’, doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.